Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R-Memcached: a consistent cache replication scheme with Memcached., , , and . Middleware (Posters & Demos), page 29-30. ACM, (2014)Generating Tourism Path from Trajectories and Geo-Photos., , , , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 199-212. Springer, (2012)Towards Efficient Deployment of Cloud Applications through Dynamic Reverse Proxy Optimization., , , and . HPCC/EUC, page 651-658. IEEE, (2013)Digital Twin: Acquiring High-Fidelity 3D Avatar from a Single Image., , , , , and . CoRR, (2019)Cyber threat prediction using dynamic heterogeneous graph learning., , , , , and . Knowl. Based Syst., (2022)On Learning Probabilistic Partial Lexicographic Preference Trees.. ICMLA, page 286-291. IEEE, (2021)Cross-view Semantic Alignment for Livestreaming Product Recognition., , , , , , and . ICCV, page 13358-13367. IEEE, (2023)Disaster Monitoring and Early-warning System for Snow Avalanche along Tianshan Highway., , , and . IGARSS (2), page 634-637. IEEE, (2009)Business Process Decomposition Based on Service Relevance Mining., , , and . Web Intelligence, page 573-580. IEEE Computer Society, (2010)Analysis of Glacier Area Variations in Geladandong Region from 1999 to 2020., , , and . IGARSS, page 187-190. IEEE, (2023)